Saturday, February 21, 2015

How to remove VBS_WORM (50)

Removal instructions for VBS_WORM (50)


Related tutorials with screenshots:

How to Remove a VBS Worm
Ultimate Guide in Removing VBS Worms 
How to block or prevent malware from running 
How to terminate a process




Analysis:


Type of file: VBSFile
Description:
Location: C:\Users\WinXPert\AppData\Local\Temp\
Size: 133703 b
MD5: BF42CC6BDAB6539B6D4E5126EC66FDF4

Keys added:
HKLM\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
HKLM\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS
HKLM\SOFTWARE\VBS_WORM (50)

Values added:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VBS_WORM (50): "wscript.exe //B "C:\Users\WinXPert\AppData\Local\Temp\VBS_WORM (50).vbs""
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VBS_WORM (50): "wscript.exe //B "C:\Users\WinXPert\AppData\Local\Temp\VBS_WORM (50).vbs""
HKLM\SOFTWARE\VBS_WORM (50)\: "false"

Files added:
%Temp%\VBS_WORM (50).vbs
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\VBS_WORM (50).vbs
F:\VBS_WORM (50).VBS


Manual Removal Instructions for VBS_WORM (50):


If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:

Make sure you create a System Restore point before proceeding:

1.  Use Task Manager to terminate the malicious process wscript.exe.

2.  Delete the VBS_WORM (50).VBS from these locations.

    %Temp%
    Startup folder 

    Root directory of USB drives

    Tutorial:  How to delete startup entries

3.  Repair the registry using this reg script.  Note that registry key VBS_WORM (44) is random and takes the filename of the vbs file.

Windows Registry Editor Version 5.00

;BF42CC6BDAB6539B6D4E5126EC66FDF4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"VBS_WORM (50)"=-
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"VBS_WORM (50)"=-
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASMANCS]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32]
[-HKEY_LOCAL_MACHINE\SOFTWARE\VBS_WORM (50)]

 
4.  Delete all *.lnk located at the root directory of your external drives.  Replace DRIVE with the correct drive letter assignment of your external drives.

DEL DRIVE:\*.LNK

5.  Unhide all hidden files and folders using this commands:  Replace DRIVE with the correct drive letter assignment of your external drives.

ATTRIB DRIVE:\*.* -S -H /S /D

6.  Update your antivirus program and perform a full scan of the computer.



All my tutorials are based on my own research.  If you find this tutorial useful, please comment or share.  You can also help fund my continued work by making a donation.  Thank you and GOD bless!


Pinoy Tech RAMBO

To GOD be the glory!

All content ("Information") contained in this report is the copyrighted work of WinXPert: Virus and Malware Removal.

The Information is provided on an "as is" basis. WinXPert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, WinXPert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2015 WinXPert. All rights reserved. All other trademarks are the sole property of their respective owners.

No comments:

Post a Comment